mthbernardes / QMKhuehuebr
Trying to hack into keyboards
☆85Updated 6 years ago
Alternatives and similar repositories for QMKhuehuebr:
Users that are interested in QMKhuehuebr are comparing it to the libraries listed below
- Red Team Resources☆59Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Learning about disassembling☆20Updated 5 years ago
- A shellcode testing harness.☆69Updated 6 months ago
- The Alternative Fileless File System☆55Updated 5 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- ☆46Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- try privilege escalation changing sudo command☆118Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 5 years ago
- Pypykatz agent implemented in .NET☆85Updated 5 years ago
- Simple DDE object detector☆55Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 4 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆39Updated 6 years ago
- ☆24Updated 8 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago